Tuesday, September 1, 2009


Does your business or home use WPA TKIP WI-FI Encryption? If it does you must read this.

It has been recently reported that the WI-Fi Protected Access, or WPA type of encryption has been cracked for the second time in as many years. Most businesses have switched over to the WPA style of WI-Fi encryption ever since the WEP (Wired Equivalent Privacy) System was made "...effectively pointless within a few years of its introduction in 1997," as reported by TechSpot.com/news. The WPA system uses a Temporal Key Integrity Protocol and has become the standard in Wi-Fi network security.

In The Beginning...

The first attack in 2008, commonly known as the "Becks-Tews" attack, was researched and orchestrated by Martin Beck and Erik Tews. It worked by intercepting short packets, reading and falsifying the information. This attack had it's limitations. Though the targets were the same WPA TKIP encryption system as the new attack, it needed the support of 802.11e QOS and it would take between 12-15 minutes to execute the attack but by then most users would become aware that the attack was taking place.

Here in the Future...

A duo of Japanese researchers have executed an attack built on the same principles as the Berk-Tews attack, and targets the same WPA system but now can do so in 60 seconds. That's only one minute until your business's precious security information can be intercepted, read and falsified. This new attack works in the same way as the 2008 attack, but the researchers have found a mathematical formula to hack in much quicker. They are "lovingly" calling this attack the "Man in the middle" attack and promise that WPA2 is next. It has also been suggested that the attacks do not threaten the overall encryption of the wireless stream.

But do you really want to take that chance?

No comments:

View My Portfolio & Samples

View Samples at Virtual Copy and JC Torpey's Portfolio.

Get writing tips and general news at the VCopy Blog.